fabio martinelli (cnr) current research challenges in cyber …€¦ · •connectivity and network...

13
Fabio Martinelli (CNR) Current research challenges in cyber security from ECSO perspective Outline of presentation: Description of the cPPP in cyber security Current elements of SRIA Some elements possibly useful for Smart Networks and Services Short bio: Fabio Martinelli is a research director of the Italian National Research Council (CNR), where He manages the Cyber Security Lab His main research interests involve security and privacy in distributed and mobile systems and foundations of security and trust. He is project coordinator of the EU Network on Cyber Security (NeCS) and of the Collaborative information sharing and analytics for cyber protection (C3ISP) project. He serves as Vice-Chairman of the Board of the European Cyber Security Organization (ECSO) and He is co-editor of the ECSO SRIA and serves in the partnership Board

Upload: others

Post on 08-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Fabio Martinelli (CNR)Current research challenges in cyber security from ECSO perspective

Outline of presentation:

• Description of the cPPP in cyber security

• Current elements of SRIA

• Some elements possibly useful for Smart Networks and Services

Short bio:

• Fabio Martinelli is a research director of the Italian National Research Council (CNR), where He manages the Cyber Security Lab

• His main research interests involve security and privacy in distributed and mobile systems and foundations of security and trust.

• He is project coordinator of the EU Network on Cyber Security (NeCS) and of the Collaborative information sharing and analytics for cyber protection (C3ISP) project.

• He serves as Vice-Chairman of the Board of the European Cyber Security Organization (ECSO) and He is co-editor of the ECSO SRIA and serves in the partnership Board

Page 2: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

We are the European Commission’s partner inimplementing the contractual public-private partnership(cPPP) on cyber security, established in 2016.€ 500 mln from the EC for H2020 R&I projects (2017-2020), leverage factor > 3 (2BE initiative).

We unite and represent European cyber security industryplayers, as well as national public administrations,research centres, SME’s and regions and academia

Our membership has grown from 132 members in June 2016to more than 250 members in June 2019 (reaching out 2000stakeholders)

Page 3: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

3

ECSO Working Groups – cybersecurity 360°

Engage directly with users (operators, companies, governments) to establish a true cyber security ecosystem, linking supply and demand, and act as a transversal WG that defines needs of the sectors for standardisation/certification, education, training and exercises, research/technologies, and

local/regional impact.Establish trusted supply chains at European level and reduce the (technical and business) impact of cybersecurity attacks.

To help SMEs to create more market transparency and to reach out far beyond their traditional home markets to partner in R&D international project and access to European market.

Contribute towards a cyber security competences and capacity building effort for the European digital agenda, through increased education, professional training and skills development, as well as actions on awareness-raising and gender inclusiveness.

Provide market intelligence & qualitative analysis, facilitate the visibility of European solutions (even beyond EU borders) and boost the level of private investment in cyber security market and its solutions.

To engage with Regions specialized in cyber security to support the implementation of an innovative Smart Commercialization Strategy

Define the cyber security R&I roadmap to strengthen and build a resilient EU ecosystem by designing and developing trusted technologies that address the challenges of digitalisation of the society and industrial sectors to foster EU digital autonomy

Page 4: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

WG6 – Strategic Research and Innovation Agenda (SRIA) and cyber technologies

NEW WG6 ORGANISATION: Current WG6 activities largely focus on the definition of R&I priorities

• SWG 6.1 “Ecosystem”

• SWG 6.2 “Digital Transformation in Verticals”

• SWG 6.3 “Data and Economy”

• SWG 6.4 “Basic and Disruptive Technologies”

• SWG 6.5 “Cybersecurity for Defence”

REPORTS & STRATEGIC DOCUMENTS

• Technical papers on Artificial Intelligence, Internet of Things and Blockchain

• Vision papers on cyber security priorities towards Horizon Europe (ECSO 2021-2027 vision): ongoing activity.

COLLABORATIONS

• cPPPs (BDVA, euRobotics, EFFRA, A.Spire, 5G, AIOTI): the ECSO technical papers will be used to continue the collaboration with the cPPPs. A jointpaper will be proposed where cyber security will be the glue factor to present common challenges with all relevant cPPPs. Interest from several cPPPsin the initiative, during common or events where ECSO has been invited to discuss the cooperation. Other initiatives (ECSEL) contacted.

• WG6 continues collaboration with EDA on Agency's research priorities and with ENISA on the research priorities identification (crystal ball).

NEXT STEPS

• Finalise the technical papers and vision documents for initial priorities. Work on a specific context case for cybersecurity for defence

Page 5: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

WG6 Strategy & Actions

Identification of R&I priorities (HorizonEurope and DEP) and alignment with industrial needs• Monitor of H2020 projects and results

• Technical papers on cyber technologies and impact on vertical sectors

• Identification of key trends and predictions

• Market analysis and investments to determine cyber security challenges in short- / medium- / long- term

• Collaboration with other cPPPs and initiatives

Digital Autonomy: investments and relevance

• Identification of key technologies and solutions (cybersecurity and cyber defence)

• Analysis of national strategies

• Risk assessment methodology for third party technology

• Analysis of the impact for vertical sectors

Support the implementation of key legislations and directives

• Needs for certification and Cybersecurity Act

• Artificial intelligence and liability (via technical papers)

• GDPR and impact on new technology (via technical papers)

Coordinated cyber security strategy across sectors and domains

•Coordination with BDVA and EFFRA initiated and well established

•Collaboration with 5G PPP under development

•Collaboration with ECSEL, EURobotics, Photonics, A.Spire

•Collaboration with EDA on Cybersecurity for Defence (dual use technologies)

•Collaboration with ENISA

Coordination with cyber security pilot projects

•Technical coordination of industrial challenges and roadmaps (also measures for certification, training and skill creation)

•Community building and governance models

Main building blocks to achieve the objectives and activities

Page 6: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Introduction to Blockchain

• A Disruptive technology that opens new possibilities for improving many services and even offers the possibility for the creation of new ones and new business models

• Even though the possibilities are enormous, its knowledge and application are still in the preliminary stage. 2 different points of view: Traditional and Disruptive

Blockchain as a technology that (i) can solve certain cybersecurity issues and (ii) needs to be properly secured

Some cyber security challenges

• Cryptocurrency economy and cryptojacking

• Data integrity & availability

• Global identity of users and devices

• Security and integrity of software/firmware and log files

• Data sovereignty

• IoT security and blockchain (P2P communication)

• Cyber Threat Intelligence (secure synchronization between different information systems)

• Traceability and transparency of processes

Technical Paper on Blockchain

Page 7: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Introduction to Artificial intelligence

• A Disruptive technology that is a subfield of computer science and it refers to any technique which enables computer to mimic human brain manifesting intelligence.

• Artificial Intelligence and Cyber security: a tight link:

• Deep understanding of AI vulnerabilities that may allow an attacker to subvert the output of the system.

• Artificial intelligence could be used and even be more efficient to attack a system rather than protecting it.

• AI as a defensive technique

Some cyber security challenges

• Privacy-aware big data analytics/data mining.

• Big data secure storage

• Trust and big data

• Big data analytics and AI for security

• Secure protocols for big data processing

• Provenance of big data

• Protection against internal and external data theft

• Adversarial machine learning

• Machine learning for cyber security

• Model cloning (protection of the AI model)

• Ethical and legal aspects (explicable AI for cyber security)

Technical Paper on Artificial Intelligence

Page 8: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Introduction to Internet of Things

• IoT is a central element in the global digitalisation trend that is reaching our industry, our economy and our society.

• The key to success is the adequate implementation (secured and trustable) of technical enablers that should be addressed to enable IoT cybersecure deployment: physical devices, connectivity and networking, IoT platforms and services, and IoT applications.

Some cyber security challenges

• At device level

• Secure execution

• Firmware and application integrity, and updates delivery.

• Protection against advanced physical attacks

• Protection against micro-architectural attacks

• Secure migration to post-quantum cryptographic algorithms

• Connectivity and network layer

• Security and privacy of data

• Transition to edge computing

• Secure key management

• Secure routing, cryptography, network level privacy

• IoT platform and IoT service layer

• Application layer and related to end-users Big data analytics and AI for security

• Cross-cutting

Technical Paper on IoT

European Cyber Security Organisation

ECSO Technical Paper on Internet of Things (IoT)

January 2019 – v0.6

Page 9: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Present and future opportunities / challenges

• Autonomous systems (cars, trains, drones, delivery, robotics, medical diagnostics): will change our lives and business models

• Mass transportation vehicle likely initially more impacted than personal cars

• Constant monitoring of many aspects of our life: huge (and sensitive) data storage (local storage becoming obsolete)

• Self-sustaining mobile devices (thanks to microelectronics and battery technologies).

• 5G networks will support growth of mobility and industrial development

• Massive presence of IoT and IIoT will impact supply chain and logistics with automatic decisions and real time adaptable, but will introducelarge “attack surface” to cyber threats and little patching capability

• Additive manufacturing and 3D printing enabling to create “everything everywhere”

• Expected major cyber attacks to critical infrastructure elements (“Cyber Pearl Harbour”)

• Massive fake news will fundamentally stress democratic rights and will distort views of reality for citizens (also with the support of socialmedia). “Trust” could become an obsolete word.

• Quantum computers will break traditional crypto and dramatically increase access to encrypted data: will post-quantum crypto providesome security?

• Cryptocurrencies will proliferate

• High use of digital twins (digital replica of a living or non-living physical entity) also as means to secure cyber physical systems

• Citizen science to tackle complex security issues that could be exploited to prevent attacks and make the systems more resilient

• AI capabilities will provide a large portion of decisions about systems, humans and society to be done by algorithms instead of humans.

• AI will lead to significant improvement of parts of cyber and physical security provisioning process. On the other hand, the samedevelopment will empower the attackers and contribute to a great number of novel and extended security threats

Page 10: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Key technologies for the future and their link to cyber security:

• Quantum computing and post-quantum cryptography (a help and a threat to cyber security)

• Artificial Intelligence and cognitive science (an enabler to anticipate and understand threats, but also apotential cyber weapon)

• 5G and new disruptive communication networks (a technological, economic and political challenge)

• Internet of Things and Cyber Physical systems (tens of thousands of connected objects: how to make themsafe?)

• Blockchain and Distributed Ledger Technologies (from bitcoin to use in a growing number of applications)

• Robots and cyborgs (support to growth or threat, in particular when coupled to AI?)

• Digital Twins

• Biotechnologies and augmented human (computing, communication, etc.)

Key Technologies - future basic and disruptive technologies, for the digital society: what future?

Page 11: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

Clustering of strategic developments to increase digital autonomy:investments and relevant topics

3Crypto and data protection • Technologies and solutions for cryptography

• Blockchain / DLT for different applications

• Secure Digital Identities & Root of Trust

• Solutions for trusted / confidential information sharing

• Technologies and solutions for secure data lifecycle

• Security for data analytics

Trustworthy IoT technologies/devices • IoT security / Cyber Physical Systems

• Trustworthy and secure personal devices on a secure core

Secure Operating Systems and dependable platforms • Open source operating systems

• High Performance / Quantum computing

• Trusted and secure European data management infrastructure (at rest and in motion)

European Internet and resilient 5G networks • 5G security (end to end)

• European trusted and secure routers Secure Network Function virtualization

Collaborative intelligence to manage cyber threats • Artificial Intelligence / Machine Learning (also for autonomous management – self-healing) / Big Data Analytics

• Multi-sovereign probes development and deployment

• European trusted Intrusion Detection System (IDS) for function, equipment and services

• European trusted Security Information and Event Management (SIEM) solutions

• Technologies and solutions for incident response

• Advanced SOCs (Security Operation Centres) and Cybersecurity control centres (connected across EU)

• Technologies and solutions for threat intelligence and cyber range

Assurance, Certification for a trustworthy • Tools for validation of Products & services certification

cyber ecosystem • EU / national validation platforms also for Software Security Assessments

• EU cybersecurity academia; education and training at national / regional / local level

Analysis of national strategies

Risk assessment methodology for third party technology

Analysis of the impact for vertical sectors Importance of large pilot projects

Page 12: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

• High complexity• Convergence of IoT, Cloud and 5G at the infrastructure level• Convergence of different technologies: Virtualization, Artificial Intelligence, SDN, etc…• Serving diverse applications, also critical and strategic services

• Large attack surface (also due to the use of new technologies)

• Continuous evolving systems• Orchestration of the security needs to be fully integrated with the orchestration of the network

• End to end security, and not only network security! • Network and application security coupling

• Multi-tenant and complex access control management

• Need and opportunity for Data Sharing, Data Usage control (including obligations management)

• …

12

Some cybersecurity challenges for future communication networks

Page 13: Fabio Martinelli (CNR) Current research challenges in cyber …€¦ · •Connectivity and network layer •Security and privacy of data •Transition to edge computing •Secure

CONTACT

European Cyber Security Organisation

10, Rue Montoyer

1000 – Brussels – BELGIUM

E-mail:

[email protected]

Follow us

Twitter: @ecso_eu

Phone:

+32 (0) 27770250

www.ecs-org.eu

[email protected]